Configuring AIX Hosts


On the Monitor Configuration page, click Addico_add.png to add a new monitor configuration, or select an existing monitor configuration and click Editico_edit.png to update it. 

On the Add Monitor Types dialog, with the Monitoring Profile set to AIX Remote Monitoring, and the Monitor Type set to AIX Hosts, provide the following details:

Field

Description

Disable Local Monitoring

Disable Local Monitoring

Select this checkbox to disable local monitoring. 

Remote Host Configuration

Host Names/File Path


Specify the host name of the server in either of the following options:

  • Single host name or IP address.
  • If you want to use the same configuration for multiple hosts, enter a comma separated list of host names or IP addresses with common credentials.
  • If you want to use the same configuration for large number of hosts, you can configure the remote hosts from a file (.txt, .csv). Enter the absolute path to the file that includes a list of host names or IP addresses. For example, the file path can be /opt/bmc/BMCPatrolAgent/Patrol3/log/Production_lpars or $PATROL_HOME/log/Production_lpars.
    • The file must contain a list of comma separated host names or IP addresses 

      info.png

      (with or without publish host names) that have common credentials. 

    •  The file must be located on the host which is running the PATROL Agent. BMC PATROL default account must have read permission on the directory where the file is located. The _ConfigStatus parameter indicates errors related to the input file.
  • A combination of all the earlier options.

You can add a publish hostname to represent the host with different a hostname or, if the Fully Qualified Domain name of the remote host cannot be retrieved. The publish hostname can be added in <hostname>;<publish_hostname> format. This format can be used in any of the above options.

Port Number

Enter the remote host SSH port number. By default, the port number is set to 22.

Credentials configuration

User Name

Enter the user name to connect to the remote host. If this field is left blank the KM uses PATROL Agent default account credentials to connect to the remote host. Password based authentication will be used for verifying the credentials.

Authentication

Select the type of authentication to add the remote host.

  • Password-Based
  • Key-Based

Password Based Authentication

Password

Enter the common credentials of the hosts added in the Host Names/File Path field.

Key Based Authentication

Public Key File Path

Specify the entire path of the public key file.

Private Key File Path

Specify the entire pathname of the private key file.

Passphrase

Specify the passphrase to access public and private keys.

Configure Monitor Types

Monitoring Options

Select the type of monitoring.

  • Standard Monitoring
  • Advance Monitoring

Advanced Configuration




Click this button to configure monitor types for the remote hosts added in the Host Names/File Path field. In the Advance Configuration dialog box, select one or more of the following objects, which you want to monitor. By default, CPU, memory and network monitor types are selected.

  • CPU
  • Memory
  • Kernel
  • NFS
  • Network
  • Users
  • Swap

Process Configuration


  1. Process: Select this checkbox to enable process monitoring on a list of given hosts.
  2. Process Configuration: Click this button provide process configuration details. The process configuration will be applied to all remote hosts added in Hosts Name/File Path field. 
  3. Process default monitoring: Select this checkbox to enable default monitoring of processes for the given set of hosts. By default, the following processes will be monitored:
    • cron
    • named
    • sendmail
    • bind
    • automount
    • amd
    • ypbind
    • ypserv
  4. Enter the process details for monitoring the processes.
    1. Process details
      1. Process Label: Enter a display name for process (s) to be monitored. The display name (process label) cannot contain special characters . [ ! @ # $ % ? { } ^ \ \ / | + = & * ( ) ) ; ] ) and blank spaces. The label can contain a maximum of 100 characters.For example: Display name can be sshd_proc, patrolagent_proc. See process configuration examples.
      2. Monitored Process StringEnter a string that matches names of processes to be monitored. Input may also be a regular expression pattern. For example: 
        • The string can be /usr/sbin/sshd, Patrol.*
        • To monitor PATROL Agent process running on port 3282 enter the regular expression as PatrolAgent -p 3282$. See process configuration examples.
      3. Minimum Count: Select a minimum limit for which an alert should be generated if the number of processes drops below the specified limit. See process configuration examples.
      4. Maximum Count: Select a maximum limit for which an alert should be generated if the number of processes exceed the specified limit. See process configuration examples.
      5. Acceptable process owner: Enter the name of the user who owns the process. Regular expressions are supported. See process configuration examples.
      6. Use Process Owners for Filtering?: Select this checkbox to filter processes based on the process owners. See process configuration examples.
      7. Parent Process ID Must Be 1: Select this checkbox if the processes should have their parent process id as 1.
      8. Filter Processes with Parent Process ID 1: Select this checkbox to filter the processes with parent process id as 1.
    2. Process Alert Options
      1. Alert Delay Count: Select the number of collection intervals after which the delay alert will be generated. See process configuration examples.


      1. Alert State: Select the type of process alert state. 
        • Alarm
        • Warning
      2. Add to List: Click this option for confirming the configuration information that you provided and adding the process name to the list of processes.
      3. Modify Selection: Select one of the items that you added to the list in the preceding step, and click this option to modify details.
      4. Remove from List: Select the items added earlier and click this option to delete that item from the list of configured processes and the clear the details provided in the earlier fields.
      5. Add: Click this option to add this monitoring configuration. This information is displayed on the Monitor Configuration page. After you click this option, you can continue to add more objects for monitoring. 
      6. Reset: Click this option to clear off your configuration details and revert to default settings.
      7. Close: Click this option to exit without saving any changes.

Expand to see process configuration examples

Scenario

Example

Comments

To receive an alert if the process count drops below
or exceeds the predefined number of processes

Process Label: bash

Process Name String: bash.*

Minimum count: 5

Maximum count: 15

None

To monitor processes started by authorized users and
receive an alert if an unauthorized user starts a process

Process Label: bash

Process Name String: bash.*

Minimum count: 5

Maximum count: 15

Acceptable process owner: abc

If "xyz" user starts bash process
Process Ownership Check attribute will
raise an alarm.

To monitor process started by a specific user and
exclude processes started by other users

Process Label: bash

Process Name String: bash.*

Minimum count: 5

Maximum count: 15

Acceptable process owner: abc|pqr|xyz

Use Process Owners for Filtering?: Select the checkbox

A pipe separated list or a regular expression of
acceptable process owners.

Here, abc, pqr and xyz are acceptable process owners.

To monitor processes whose Parent Process ID is one

Process Label: bash

Process Name String: bash.*

Minimum count: 5

Maximum count: 15

Parent Process ID must be 1: Select the checkbox

Filter Processes with Parent Process ID 1: Do not select the checkbox

This configuration is usually suitable for
system processes

To filter processes whose Parent Process ID is one

Process Label: bash

Process Name String: bash.*

Minimum count: 5

Maximum count: 15

Parent Process ID must be 1: Do not select checkbox

Filter Processes with Parent Process ID 1: Select checkbox

None

To delay alert by 'N' number of collections

Process Label: bash

Process Name String: bash.*

Minimum count: 5

Maximum count: 15

Alert Delay Count: 3

Alert State: Warning or Alarm

This will delay an alert if some process violates the
set minimum or maximum limit.

To avoid delay and get immediate alert if a process
violates configured minimum or maximum thresholds

Process Label: bash

Process Name String: bash.*

Minimum count: 5

Maximum count: 15

Alert Delay Count: 0

Alert State: Warning or Alarm

None

To monitor processes that begin with /usr/sbin

Process Label: bash

Process Name String: bash.*

Monitors all the processes that
begin with /usr/sbin

Monitor processes like:

/usr/sbin/sshd

/usr/sbin/syslogd

/usr/sbin/inetd

Back to host configuration


FileSystem Configuration


  1. File Systems: Select this checkbox to enable file system monitoring on a list of given hosts.
  2. FileSystem Configuration: Click this button provide file system configuration details. The configuration will be applied to all remote hosts added in Hosts Name/File Path field. 
  3. Enter the details for monitoring the file systems. 
    1. FileSystem Include/Exclude Operation


      1. Exclude FileSystemEnter the filesystem name or a regular expression to exclude filesystems from monitoring.To exclude multiple filesystems, enter a comma separated list of regular expressions. To exclude the root filesystem use the ^/$ regular expression. If the rules are equally specific (if you exclude a file, and include the same file) then exclude takes precedence over include.
      2. Include FileSystemEnter the filesystem name or a regular expression to include filesystems for monitoring. To include multiple filesystems, enter a comma separated list of regular expressions. To include the root filesystem use the ^/$ regular expression. Note: The filesystem monitor type enables monitoring of the following filesystems by default.
        • ^/$ (root)
        • ^/tmp$ (tmp)
        • ^/usr$ (usr)
        • ^/home$ (home)
    1. Filesystem filtering on basis of type 
      1. Filesystem exclusion on type: Selecting any of the following checkboxes has priority over include regex pattern.
        1. Ignore NFS Filesystems: Select this checkbox to exclude network filesystem instances from monitoring.
        2. Ignore CDFS FilesystemsSelect this checkbox to exclude CD-ROM filesystem instances from monitoring.
        3. Ignore PROC Filesystems: Select this checkbox to exclude proc filesystem instances from monitoring.
        4. Ignore Other Filesystems: Select this checkbox to exclude any other type of filesystem instances from monitoring.
        5. Other FileSystem types to ignore: Enter a space separated list of other filesystem instances to exclude from monitoring.
      2. Destroy Unmounted FileSystemIf the filesystem is unmounted and any of the following options are selected, the corresponding filesystem instances will be destroyed from PATROL Agent. The Mount Status parameter will not be set to alarm if the filesystem is unmounted. If such filesystems are mounted again, the instances will be rediscovered.
        1. Ignore Persistence for NFS Filesystems: Select this checkbox to remove the existing unmounted network filesystem instances.



        1. Ignore Persistence for NFS Filesystems: Select this checkbox to remove the existing unmounted CD-ROM filesystem instances.
        2. Ignore Persistence for PROC Filesystems: Select this checkbox to remove the existing unmounted PROC filesystem instances.
        3. Ignore Persistence for Other Filesystems: Select this checkbox to remove the other types of unmounted filesystem instances.
        4. Ignore Persistence for Other Filesystems: Enter a space separated list of other types of unmounted filesystem instances. These filesystems will be removed.

Back to host configuration, process configuration.

Disk Configuration


  1. Disk: Select this checkbox to enable disk monitoring on a list of given hosts.
  2. Disk Configuration: Click this button provide disk configuration details. The disk configuration will be applied to all remote hosts added in Hosts Name/File Path field. 
  3. Enter the details for monitoring the disks. 
    1. Disk Include/Exclude Operation
      1. Exclude Disk: Enter the disk name or a regular expression to filter disks that you want to exclude from monitoring. To exclude multiple disks, enter a comma separated list of regular expressions.If the rules are equally specific (if you exclude a file, and include the same file) then excludetakes precedence over include. 
      2. Include Disk: Enter the disk name or a regular expression to filter disks that you want to include for monitoring. To include multiple disks, enter a comma separated list of regular expressions.By default all the disks are included for monitoring.

Back to host configuration, process configuration, filesystem configuration.

Error Log Report configuration

Error log report: Select this checkbox to enable the Error log report.

Include by error class name: Type the error class name to be included for monitoring. The following error classes are supported:

  • H-To monitor hardware error
  • S-To monitor software error
  • O-Errlogger command messages
  • U-Undetermined

To include multiple error classes, provide them as a comma-separated list without space. For example, H,S.

Include by error type: Enter the error type to be included for monitoring. The following error types are supported:        

  • INFO
  • PEND
  • PERF
  • PERM
  • TEMP
  • UNKN

To include multiple error types, provide them as a comma-separated list without space. For example, PEND,PERF,PERM.

Consolidates duplicate errors: Select this checkbox to combine identical error messages into a single entry.

Annotations

Generate Annotation: Select this checkbox to generate the annotation details. Annotation refers to additional details about specific error entries.

Generate Detailed Annotation: View detailed annotations for the top n errors and get comprehensive insights into specified errors. The minimum and maximum values are 0 and 20 respectively.

For example,

  • if you enter 0, no annotation details are displayed.
  • if you enter 3 in this field, the detailed annotation for the top 3 errors is displayed.

Add to List

Click this option for confirming the configuration information that you provided and adding the host name to the list of hosts.

Modify Selection

Select one of the items that you added to the list in the preceding step, and click this option to modify details.

Remove from List

Select the items added earlier and click this option to delete that item from the list of configured hosts and the clear the details provided in the earlier fields.

Reset

Click this option to clear off your configuration details and revert to default settings.

Add

Click this option to add this monitoring configuration. This information is displayed on the Monitor Configuration page. After you click this option, you can continue to add more objects for monitoring.

Close

Click this option to exit without saving any changes.

Back to Host configuration, Process configuration, Filesystem configuration, Disk configuration

Back to top

Related topics

Configuring-after-installation 

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*